Download presentation
Presentation is loading. Please wait.
Published byPreston Strickland Modified over 9 years ago
1
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011
2
Motivation A secure Cloud Computing architecture model requires a security layer at each design level. We are talking from a provider point of view. Cloud Computing is a broad Subject. We will only focus on the architecture of Infrastructure as a Service layer
3
Cloud Computing Deployment models Private Cloud is concerned with the internal needs of an organization A public Cloud sells services to the general public Hybrid Cloud pools resources from different Clouds. It is a combination of public and private Cloud A community Cloud is a joint effort between different organizations to share resources
4
How does a provider choose a deployment model? Deployment models are driven by: Organization Needs Prospective customers requirement Cloud security concerns Our design approach is based on the Cloud Case Study example we present in the next slide
5
Example: Design a Cloud Computing for FAU with the following requirement On demand secure software development and testing environment for researchers/programmers: example.NET, Java, C++, database development environment Provide secure research laboratory as a service Pool cloud idle resources to run simulations; guaranty a minimum computation at peak time. offload computing to public Cloud such as Amazon EC2
6
What deployment model fit the above FAU Cloud? Choose a private Cloud solution with Amazon EC2 compatible API. Let us Take a closer look at the requirement -- Provision of Simulation for research purpose belongs to the SaaS layer -- The secure development and test environment fit in PaaS layer -- On demand secure research laboratory provision requires a IaaS Layer
7
Security Requirement for FAU Cloud We need to address security at each Level of the design -- IaaS layer Security requirement (this Presentation) -- PaaS layer Security requirement (Future Presentation) -- SaaS layer Security requirement (Future Presentation)
8
Note We will respectively cover Security at the PaaS and SaaS in two future presentations At this point there will be no section reserved for Saas and PaaS
9
FAU Cloud IaaS Security requirement Availability: High throughput network bandwidth Physical Data Center temperature. Restricted physical access to the Data Center Redundant power source in case of power failure.
10
FAU Cloud IaaS Security requirement Hardware maintenance agreement Virtual Data Center policy Compliance with electrical and data wiring Cloud Server configuration Back up and recovery policy Fire prevention policy Administrator Policy
11
IAAS Security Requirement Secure protocol policy Intrusion Detection System Firewall Antivirus Anti malware
12
FAU Private Cloud Server Security Policy All server must have the following packages -- Intrusion Detection System (IDS) -- Firewall -- Antivirus -- Anti malware Secure Protocol such as ssh, sftp, scopy
13
FAU Secure Private Cloud Architecture We choose an Open Source solution: Eucalyptus Cloud -- Complement it with third party power management subsystem and -- Cloud Monitor Controller The following components will be described in the next few slides Node Controller Storage Controller Cloud Controller Cluster controller Walrus Storage Power management Controller Cloud Monitor System
14
Figure 1 shows a rough draft of the Eucalytus model (Courtesy of http://csrdu.org/blog/2010/10/23/introduction-to-private-cloud-computing-with-ubuntu-enterprise-cloud/)
15
Node Controller Runs as a server Control Virtual machine instances Discover hypervisors resources Interfaces with Cluster Controller and Hypervisors Provision resources to the VM Propagate data to Cloud Controller Security measure: -- Apply server security policy as describe above
16
Use case for Node Controller
17
Storage Controller Similar to Amazon elastic block storage services Ability to create snapshots Create and manage persistent block storage device Security measure -- Apply server security policy as describe above
18
Use case for Storage Controller
19
Cloud Controller Monitor the overall cloud infrastructure Monitor Node controller of hypervisor resources Interfaces with Cloud administrator Provide resource arbitration Monitor Virtual machine migrations Run on top OS server
20
Cloud Controller (continued) Security measure -- Apply server security policy as describe above
21
Use case for Cloud Controller
22
Cluster controller Process Cloud Controller to deploy instances Select available hypervisor to deploy virtual machines Audit hypervisors and report to Cloud Controller Security measure -- Apply server security policy as describe above
23
Use case for Cluster Controller
24
Walrus Storage Services Compatible with Amazon S3 Capacity to store virtual machine images Store snapshot Use S3 API to store files Can coexist on the Cloud Controller server Security measure: -- Apply server security policy as describe above
25
Use case for walrus services
26
Power management Controller Monitor power grid for failure Failsafe to backup power subsystem Auto detect grid power to return to normal state Security measure: Use Secure channel to shutdown system Allow trusted host by IP address and Mac Address
27
Use case for Power Management
28
Cloud Monitor System Monitor room temperature Monitor Cloud, Cluster, storage and hypervisors controllers performance Alert system administrator on any abnormality Security measure: Restrict access to admin Patch daily as needed Apply Organization security policy
29
Use case for Cloud Monitor system
30
Cloud administrator Manage Users Manage Roles Create Data Center Manage VMs Create Cloud Security Policy
31
Use case for cloud Administrator
32
The FAU Private Cloud ARchitecture Class diagram for Infrastructure as a service is shown in the next slide.
33
FAU private Cloud Architecture Class Diagram
34
Implementation of IaaS layer for the FAU Private Cloud
35
conclusion We only provide a secure architecture for Infrastructure as a Service in the FAU private Cloud Example. The design was based on security requirement for the respective layer Future presentation will address PaaS and SaaS Secure architecture
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.